International Conference on Advanced Communication Systems and Information Security (ACOSIS'16)
October 17-19, 2016 Marrakesh, Morocco

Call for papers

The international conference on Advanced Communication Systems and Information Security (ACOSIS 2016)
October 17-19, 2016, Marrakesh, Morocco.

To download the PDF version of the CFP, click here.

The international conference on Advanced Communication Systems and Information Security (ACOSIS 2016) is a forum for scientists, engineers, and practitioners to present their latest research results, ideas, developments, and applications in all areas of communication systems and information security.

ACOSIS has been organized for the last six years, and that is in the form the workshops. The first edition which has been organized at ENSAM-Meknes in 2010, the edition of 2011 in ENSIAS-Rabat, 2012 edition in FSO-Oujda, 2013's edition was held at EST-Meknes and in 2014 in FS-El Jadida.

In this edition ACOSIS switches to the conference size that will be organized in Marrakesh on October 17-19, 2016.

Topics of interest include, but are not limited to:

Track 1: PHY and Fundamentals
Channel characterization, estimation, and modeling
Signal processing for wireless communications
Modulation, multi-carrier modulation, OFDM
Space-time coding, beamforming, MIMO
Diversity, equalization
Coding, and Decoding Algorithms
Distributed coding, Network Coding
Turbo-codes, Iterative Processing
Information theory
Interference management, alignment, and cancellation
Energy efficient PHY layer design, energy harvesting
RF circuits for wireless communications
PHY layer design for wireless communication systems
Track 2: Communication Systems Design
Cooperative and multihop relay communications
Free space optics, radio over fiber
mmWave and visible light communications
Cognitive radio, spectrum sensing
5G paradigm, cloud
Vehicular communications
Green communications
Broadband communications
Machine-to-Machine communications
RFID networks and protocols
Ad hoc, mesh and Wireless sensor networks
IP multimedia subsystems (IMS)
Track 3: Information Security
Wireless network security and privacy
PHY layer security
Security in grid, pervasive computing
Authentication and authorization
Key Exchange, Storage and Protection
Malware and attack detection and prevention techniques
Security, privacy and confidenciality in cloud networking
Secure cryptographic protocols for advanced communication systems
Security, privacy, and trust in wireless communications
Security, privacy, and trust in social networks
Miscellaneous Security, privacy, and trust issues
Information hiding and watermarking

Authors are invited to submit papers of original material that isn't currently under review in any other conference or journal.
Submission should be written in english with a maximum paper length of 10 printed pages, standard IEEE 2-columns format.
Standard IEEE Transactions templates for Microsoft Word or LaTeX formats can be found at: conferences_events/ conferences/publishing/templates.html.

The authors whose papers are accepted for a Poster session are invited to download the Poster Layout here.

Paper submission should be processed via EDAS platform, via the link:
All submitted papers will be reviewed by experts in the fields based on the criteria of originality, significance, quality and clarity.

Accepted and presented papers will be submitted for inclusion in IEEE Xplore. They will also be submitted to SCOPUS, ISI, DBLP and other leading indexing services.
Papers of a particular merit may be recommended for a special issue in an international journal. Best Papers awards and prizes will be given too.

Important Dates

Paper Submission

August 14, 2016   August 21, 2016

Paper Acceptance Notification

September 21, 2016   September 25, 2016


October 1, 2016


October 5, 2016

Conference Days

17-19 October, 2016

Partners and Sponsors

Certified Event

Certified Event